A Study of Cyber Threats and Security Frameworks in Cloud Computing

No Thumbnail Available

Date

2025

Journal Title

Journal ISSN

Volume Title

Publisher

Chapman and Hall/CR

Abstract

Cloud computing has transformed the way businesses store, manage, and process data, providing unparalleled scalability, flexibility, and cost-effectiveness. However, the growth of cloud technology creates new cybersecurity difficulties and vulnerabilities. This research chapter provides a thorough examination of cyber risks and security frameworks in cloud computing settings. Various sorts of cyber risks, including data breaches, malware, distributed denial of service (DDoS) attacks, insider threats, and misconfigurations, are recognized and examined in the context of cloud computing. Furthermore, this study investigates current security frameworks and best practices for mitigating these vulnerabilities, such as encryption, access restrictions, authentication systems, and monitoring solutions. This study, which synthesizes insights from academic research, industry reports, and real-world case studies, provides valuable insights into the evolving landscape of cyber threats in cloud computing and makes practical recommendations for implementing effective security measures to protect cloud environments.

Description

Cyberology An Optimized Approach to the Cyber-World Edited ByMohd. Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmed, Saurabh Shukla, Adil Kaleem

Keywords

Computer Science, Engineering & Technology

Citation

Endorsement

Review

Supplemented By

Referenced By